Network forensics is the process of capturing, storing and analyzing activity that takes place on a computer network. While it’s often associated with solving network security breaches, the practice ...
If a company has experienced a security breach, it’s often difficult to quantify the IT risks to the organization. In the face of a threat to information resources and customer confidence, the company ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of ...
The role of computer-based material is now vital to the modern litigation process. With the explosion in the use of electronic documents, spreadsheets and e-mail, the volume of information held on ...